Sciweavers

176 search results - page 22 / 36
» On the fractal behavior of TCP
Sort
View
LCN
2005
IEEE
14 years 1 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
INFOCOM
2003
IEEE
14 years 24 days ago
Understanding CHOKe
— A recently proposed active queue management, CHOKe, is stateless, simple to implement, yet surprisingly effective in protecting TCP from UDP flows. As UDP rate increases, even...
Ao Tang, Jiantao Wang, Steven H. Low
WWW
2009
ACM
14 years 8 months ago
Anycast-aware transport for content delivery networks
Anycast-based content delivery networks (CDNs) have many properties that make them ideal for the large scale distribution of content on the Internet. However, because routing chan...
Zakaria Al-Qudah, Seungjoon Lee, Michael Rabinovic...
NETGAMES
2003
ACM
14 years 23 days ago
Modeling player session times of on-line games
One of the most important aspects in determining the global traffic characteristics of on-line games is to model the traffic behavior of the client. While modeling the client ON-O...
Francis Chang, Wu-chang Feng
SIGMETRICS
1997
ACM
111views Hardware» more  SIGMETRICS 1997»
13 years 11 months ago
Cache Behavior of Network Protocols
In this paper we present a performance study of memory reference behavior in network protocol processing, using an Internet-based protocol stack implemented in the x-kernel runnin...
Erich M. Nahum, David J. Yates, James F. Kurose, D...